Unlock instant, AI-driven research and patent intelligence for your innovation.

Computer readable storage medium and RFID (radio frequency identification) system using same

A storage medium and computer technology, applied in the field of RFID systems, can solve problems such as inability to guarantee data transmission security, hidden dangers of RFID system security, poor chip security, etc., to enhance randomness and reliability, resist man-in-the-middle attacks, and prevent security problem effect

Inactive Publication Date: 2018-04-03
GUANGDONG CHUTIAN DRAGON SMART CARD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The RFID system itself is an open identification system, and its communication channel is open. Attackers can illegally steal the communication information between the reader and the electronic tag of the RFID system. Therefore, the RFID system has certain security risks.
Moreover, the security of the chip itself of the electronic tag is also poor, and it is easy to be cracked, and the security of its transmitted data information has become an urgent issue.
The traditional RFID system encryption method is to encrypt the communication data through the stream key, etc., and the receiver decrypts the data after receiving it, such as the LFSR encryption and decryption algorithm based on the linear feedback shift register LFSR, but if the key is encrypted during data transmission The security of data transmission cannot be guaranteed even if it is stolen or leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer readable storage medium and RFID (radio frequency identification) system using same
  • Computer readable storage medium and RFID (radio frequency identification) system using same
  • Computer readable storage medium and RFID (radio frequency identification) system using same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The RFID system used to implement the stream key applied to RFID system authentication in this embodiment includes such as figure 2 In the AES-LFSR-based stream key generator shown, AES and LFSR constitute the front-end part of the AES-LFSR-based stream key generator, and the pseudo-random number sequences generated by AES and LFSR are subjected to the nonlinearity of the Bool function After the combination, the stream key required in the RFID system authentication process is finally obtained. The Bool function has nonlinearity and low autocorrelation. The Bool function is more random, and its security is higher. Using the Bool function to process the sequence generated by AES and LFSR to obtain a combination function can improve the statistical characteristics of the stream key. and complexity. Due to the high security of the AES encryption and decryption algorithm itself, it is difficult for attackers to crack. Therefore, it is also difficult for attackers to obtain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of radio frequency identification tag identification, in particular to a computer readable storage medium and an RFID (radio frequency identification) system using the same. A computer program is stored in the medium and can be executed by the RFID system. By the aid of a stream key generator based on an AES-LFSR (advanced encryption standard-linear feedback shift register), an AES encryption-decryption algorithm is fused into a front end generating a stream key sequence, security of a stream key can be improved when randomness is ensured. By the aid of a mode of the stream key, difference of secret keys in each communication process is ensured, man-in-the-middle attack can be effectively resisted, the problems of security caused after the stream key is stolen or leaked in the authentication process are solved, and randomness and reliability of data are enhanced.

Description

technical field [0001] The invention relates to the field of radio frequency electronic tag identification, in particular to a computer-readable storage medium and an RFID system using the medium. There is a computer program stored in the medium, and the computer program can be executed by a processor of the RFID system. Background technique [0002] With the rapid development of the Internet of Things, radio frequency identification (RFID, Radio Frequency Identification) technology has been widely used in today's society. Because of the wide application of radio frequency identification technology in information exchange, its security has also begun to be valued. The RFID system itself is an open identification system, and its communication channel is open. Attackers can illegally steal the communication information between the reader and the electronic tag of the RFID system. Therefore, the RFID system has certain security risks. Moreover, the security of the chip itself o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06G06K7/00
CPCH04L9/065G06K7/0008H04L9/0631H04L9/0662
Inventor 刘冬生邬亮彭浩毅何云波袁天柱
Owner GUANGDONG CHUTIAN DRAGON SMART CARD